0214~0215_胖先生和高大個(賴馬創作30週年紀念版)
0214~0215_全家取貨

英文書 > 全部商品

Unleashing the Power of Blockchain and Iot for Water Informatics

Springer 出版
2025/07/04 出版
9 特價10439
貨到通知
下次再買

The vCISO Playbook

Yan,Ross Jd  著
2025/07/04 出版

The vCISO Playbook: How Virtual CISOs Deliver Enterprise-Grade Cybersecurity to Small and Medium Businesses (SMBs) Protect Your Data with a vCISO Working for Your Business The authors of this Guide have focused on two principal audiences: Small and Midsized Businesses (SMBs) and Virtual Chief Information Security Officers (vCISOs). vCISOs in this context may also be referred to as Subject Matter Experts (SMEs). By extension, we include in our audience trusted professional advisers to SMBs, such as attorneys, investment bankers, and financial consultants. Our combined experience in cybersecurity and small business matters spans over 50 years, and we have concentrated on the intersection of the needs of SMBs with the capabilities of vCISOs. We are versed in the growing necessity of SMBs in the supply chains of critical infrastructure to demonstrate that they have taken steps to assure their ability to prevent or recover from cyber-attacks. Note that we have included two Appendices with public source information on the DHS/CISA list of the 16 critical infrastructure sectors, as well as SMBs' participation in their supply chains. Appendix 3 sets out the features of Beta Centauri℠, our proprietary program to create an efficient working relationship between SMBs and vCISOs. In Appendix 4, we have included summaries of four articles published recently in Cyber Defense Magazine on the stages of successful relationships between SMBs and vCISOs. Typically, SMBs have experienced a fundamental conflict between the importance of managing the risk of cyber attacks and the cost of having a full time Chief Information Security Officer (CISO). To begin with, the basic techniques of cyber risk management can be overwhelming to owners and managers of SMBs; they are complex and tend to change quickly as new forms of attack and response develop. According to Bank of America's most recent Small Business Report, while 71% of small businesses report that they have digitally optimized their operations over the past 12 months, only 21% have added cybersecurity measures to their businesses. Of mid-sized businesses, 90% report that cybersecurity is a threat to their business, but only 63% are keeping software up to date, 60% are investing in digital security systems, and a paltry 50% are investing in employee security training [1]. Unfortunately, the myth persists that SMBs are too small to be targets for cyber criminals. On the contrary, they are often low-hanging fruit, with a combination of lax cybersecurity measures making them subject to existential threats by such attack modes as ransomware. According to a Microsoft report conducted by research firm Bredin, one-third of SMBs suffered a cyber attack during the past year (2024), with the average cost of each incident amounting to over $250,000.[2] The potential adverse impact of a ransomware attack or data breach can be devastating. It has been observed that it would have a similar effect on a company in the critical infrastructure supply chain as a provider of services requiring security clearances for employees. If a vital employee suffered an identity theft incident, they would be unable to access the government secure facility to carry out their work. [1] Bank of America. (2024). 2024 Business Owner Report. https: //business.bofa.com/en-us/content/2024-business-owner-report.html [2] https: //cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/SMBCybersecurity-Report-Final.pdf

9 特價1267
立即代訂
下次再買

The Future of Hacking

2025/07/04 出版

In a world, where cyber threats evolve daily, the line between hacker and hero is thinner than you think. Hacking is no longer just a shadowy underground activity-it's an essential part of our digital world. The Future of Hacking explores the evolving landscape of cybersecurity, ethical hacking, and digital defense, revealing how hackers protect as much as they attack. Drawing on extensive research and expert interviews from around the world, Laura Scherling uncovers the real-world impact of cybercrime, internet freedom, and digital policy. This accessible yet deeply researched book challenges misconceptions about hacking, highlights the work of those defending our digital future, and helps readers understand why cybersecurity is now everyone's concern. The future of hacking is here.

9 特價1866
立即代訂
下次再買

You Have a New Memory

Aiden,Arata  著
2025/07/03 出版

NATIONAL BESTSELLER An open-hearted interrogation of our digital selves, braiding cultural criticism, memoir, and narrative musings into an exploration of identity, girlhood, media, tech, nature and "finding the depth and beauty in the fucked-up world we live in" from a writer, artist, and influencer (Phoebe Bridgers). YOU HAVE A NEW MEMORY is a deeply human inventory of the digital sphere, a searing analysis of the present and a prescient assessment of the future. In her highly anticipated debut, Aiden Arata brings us raw reportage from the liminal space between online and offline worlds, illuminating how we got here and where to go next. With high-res, cosmic vision and razor-sharp wit, this kaleidoscopic collection of essays artfully explores what it means to exist on the internet. Arata exposes influencer grifts from the perspective of a grifter, digs into the alluring aesthetic numbness of stay-at-home girlfriend content creators, and interrogates our online fetishization of doom to grapple with the real-world apocalypse. Arata is the wry, unexpected voice we need to navigate existing simultaneously as creators, consumers, and products in our increasingly braver and newer world.

9 特價957
立即代訂
下次再買

Artificial Intelligence Paradigms for Application Practice

Shiguo,Lian  著
CRC Press 出版
2025/07/03 出版

This book proposes practical application paradigms for deep neural networks, aiming to establish best practices for their real-world implementation.

9 特價4801
立即代訂
下次再買

Self-Healing Networks and Resilient Architectures

Nutan,Gusain  著
Ingram 出版
2025/07/01 出版

This book explores the emerging paradigm of self-healing networks-digital infrastructures that can automatically detect, diagnose, and repair faults without human intervention. With growing reliance on uninterrupted connectivity across sectors like healthcare, smart cities, military, and autonomous systems, network resilience has become critical. The book explains key concepts such as fault tolerance, robustness, survivability, and adaptability, and shows how these are achieved through technologies like AI/ML, SDN, NFV, edge computing, blockchain, and digital twins. It outlines practical design principles for building networks that remain operational even in failure conditions, offering both theoretical foundations and real-world case studies. Written in an engaging, accessible style, the book serves as a guide for engineers, researchers, and decision-makers aiming to build intelligent, fault-tolerant, and highly available network systems.

9 特價3258
立即代訂
下次再買

Computer Network LAB

2025/07/01 出版

Networking refers to the practice of connecting computers and other devices to share resources, exchange data, and communicate. It forms the backbone of modern communication and the internet, enabling everything from email and social media to cloud computing.Objectives of a Computer Network LabEducational: Provide hands-on experience with networking hardware and software.Research: Enable experimentation and development of new networking protocols and technologies.Testing: Allow for the simulation and analysis of network performance and security.Development: Support the creation and troubleshooting of network-based applications.

9 特價3167
立即代訂
下次再買

Energy and Throughput Optimization in NB-IoT Networks

2025/07/01 出版

This study aims to enhance energy efficiency and network throughput in Narrowband IoT (NB-IoT) and Narrowband Cognitive Radio IoT (NB-CR-IoT) networks. A novel three-hop communication strategy is proposed, employing a double auction mechanism to optimize relay selection and extend the battery life of cell-edge NB-IoT users (CENUs). The approach is supported by the EENU-MWM algorithm, which ensures efficient and fair user matching. With the rapid proliferation of IoT devices, critical challenges such as spectrum congestion and hardware limitations for continuous sensing have emerged. To address these issues, the study introduces optimized sensing parameters and relay node selection strategies within NB-CR-IoT and Narrowband Cognitive Radio Internet of Medical Things (NB-CR-IoMT) frameworks. These enhancements improve overall data throughput while reducing transmission power consumption.

9 特價5105
立即代訂
下次再買

Wireless Sensor Network Security

Ingram 出版
2025/07/01 出版

Wireless Sensor Networks (WSNs) have expanded rapidly due to advances in communication technologies, offering diverse applications that benefit society. WSNs rely on interconnected sensor nodes and demand secure data transmission and resource access to ensure Quality of Service (QoS) in IoT systems. However, current systems often rely on single-layer security or classical cryptography, which are prone to attacks and lead to energy inefficiency from key management tasks. Biometric or fuzzy logic-based methods also fall short in optimizing security. A lightweight, secure, and durable paradigm for WSNs is crucial. We propose a high-efficiency routing system using Systematic-Random Linear Network Coding (S-RLNC), integrating multi-generation mixing, advanced pre-coding, and interleaving for secure, QoS- aware communication. Simulations show improved packet delivery, reduced redundancy, energy efficiency, and minimal packet loss. Additionally, a novel multi-factor authentication approach combining biometrics, time stamping, and RSA-assisted ECC enhances security and QoS with lower latency and higher delivery rates.

9 特價3167
立即代訂
下次再買

The Language of Machines

Ingram 出版
2025/07/01 出版

This book offers a clear, accessible guide to the inner workings and real-world impact of large language models (LLMs). As AI becomes increasingly integrated into daily life, understanding how LLMs generate human-like text is crucial for professionals across technology, education, policy, and more. The book covers core concepts in NLP and machine learning, while addressing ethical concerns like algorithmic bias, privacy, and automation's effects on employment. Through real-world case studies from organizations like OpenAI and DeepMind, it explores both the promise and risks of AI-powered communication tools. By connecting technological advancements with ethical and societal questions, The Language of Machines equips readers to engage thoughtfully with AI and its evolving role in shaping our world.

9 特價3167
立即代訂
下次再買

IoT Security using VHDL

Ingram 出版
2025/07/01 出版

Designing robust IoT security solutions using VHDL offers a pathway to hardware-level protection against various threats. VHDL allows developers to implement cryptographic algorithms like AES or RSA directly into the hardware, providing significantly faster and more energy-efficient encryption compared to software implementations. Furthermore, VHDL can be used to create secure boot mechanisms that verify the integrity of firmware during startup, preventing unauthorized code execution. Implementing access control mechanisms and authentication protocols in hardware using VHDL also strengthens security by reducing the attack surface vulnerable to software exploits. By leveraging the capabilities of VHDL, developers can create tamper-resistant and highly secure IoT devices that are difficult for malicious actors to compromise, ultimately fostering trust and reliability within connected ecosystems.

9 特價3672
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025

Springer 出版
2025/06/30 出版

The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.

9 特價4697
立即代訂
下次再買

Navigating the Digital Maze

Ingram 出版
2025/06/30 出版

Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections between social media, mental health, and safety. It goes on to explore the impact social media has had on mental health since the rise of YouTube, Instagram, TikTok, and Snapchat, providing tips for healthy social media consumption with a focus on authenticity, equanimity, and moderation. The book addresses some of today's most pressing topics-cyberbullying, trolling, body-shaming-and provides proven prevention and coping strategies for teens. It also highlights the contribution parents, educators, and therapists must make for the maintenance of a safe digital world, along with chapters on self-care methods such as journaling and mindfulness. Navigating the Digital Maze gives readers the knowledge needed to navigate their online presence and form helpful online communities to lead a more healthy, balanced digital life.

9 特價1606
立即代訂
下次再買

Navigating the Digital Maze

Ingram 出版
2025/06/30 出版

Navigating the Digital Maze-Social Media, Mental Health, and Safety is a guide to the connections between social media, mental health, and safety. It goes on to explore the impact social media has had on mental health since the rise of YouTube, Instagram, TikTok, and Snapchat, providing tips for healthy social media consumption with a focus on authenticity, equanimity, and moderation. The book addresses some of today's most pressing topics-cyberbullying, trolling, body-shaming-and provides proven prevention and coping strategies for teens. It also highlights the contribution parents, educators, and therapists must make for the maintenance of a safe digital world, along with chapters on self-care methods such as journaling and mindfulness. Navigating the Digital Maze gives readers the knowledge needed to navigate their online presence and form helpful online communities to lead a more healthy, balanced digital life.

9 特價2065
立即代訂
下次再買

Learning Kubernetes Security - Second Edition

Raul,Lapaz  著
Packt 出版
2025/06/30 出版

Get practical, hands-on experience in Kubernetes security-from mastering the fundamentals to implementing advanced techniques to safeguard your Kubernetes deployments against malicious threatsKey Features: - Understand Kubernetes security fundamentals through real-world examples of threat actor tactics- Navigate the complexities of securing container orchestration with practical, expert insights- Deploy multiple Kubernetes components, plugins, and third-party tools to proactively defend against cyberattacks- Purchase of the print or Kindle book includes a free PDF eBookBook Description: With readily available services, support, and tools, Kubernetes has become a foundation for digital transformation and cloud-native development, but it brings significant security challenges such as breaches and supply chain attacks.This updated edition equips you with defense strategies to protect your applications and infrastructure while understanding the attacker mindset, including tactics like container escapes and exploiting vulnerabilities to compromise clusters. The author distills his 25+ years of experience to guide you through Kubernetes components, architecture, and networking, addressing authentication, authorization, image scanning, resource monitoring, and traffic sniffing. You'll implement security controls using third-party plugins (krew) and tools like Falco, Tetragon, and Cilium. You'll also secure core components, such as the kube-apiserver, CoreDNS, and kubelet, while hardening images, managing security contexts, and applying PodSecurityPolicy. Through practical examples, the book teaches advanced techniques like redirecting traffic from misconfigured clusters to rogue pods and enhances your support incident response with effective cluster monitoring and log analysis.By the end of the book, you'll have a solid grasp of container security as well as the skills to defend your clusters against evolving threats.What You Will Learn: - Implement Kubernetes security best practices, from threat detection to network protection- Build strong security layers and controls using core Kubernetes components- Apply theory through hands-on labs to secure Kubernetes systems step by step- Use security plugins and open-source tools to help mitigate container-based threats- Set up monitoring and logging to quickly detect and respond to cybersecurity threats- Analyze attacker tactics to build stronger cluster defense strategiesWho this book is for: This book is for DevOps and Platform teams managing Kubernetes environments. As security is a shared responsibility, it also addresses on-premises and cloud security professionals, as well as beginner and advanced incident responders. No expert knowledge is required; a basic tech background is all you need as this book covers Kubernetes fundamentals and security principles, delivering practical insights for anyone looking to stay current with modern tech and strengthen their security skills.Table of Contents- Kubernetes Architecture- Kubernetes Networking- Threat Modeling- Applying the Principle of Least Privilege in Kubernetes- Configuring Kubernetes Security Boundaries- Securing Cluster Components- Authentication, Authorization, and Admission Control- Securing Pods- Shift Left (Scanning, SBOM, and CI/CD)- Real-Time Monitoring and Observability- Security Monitoring and Log Analysis- Defense in Depth- Kubernetes Vulnerabilities and Container Escapes- Third-Party Plugins for Securing Kubernetes

9 特價2064
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025

Springer 出版
2025/06/29 出版

The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.

9 特價4175
立即代訂
下次再買

Computational Science and Its Applications - Iccsa 2025

Springer 出版
2025/06/29 出版

The three-volumes LNCS 15648, 15649, 15650 set constitutes the refereed proceedings of the 25th International Conference on Computational Science and Its Applications - ICCSA 2025, held in Istanbul, Turkey, during June 30-July 3, 2025. The 71 full papers, 6 short papers, and 1 PHD showcase paper were carefully reviewed and selected from 269 submissions. The papers have been organized in topical sections as follows: Part I: Computational Methods, Algorithms and Scientific Applications; High Performance Computing and Networks; Geometric Modeling, Graphics and Visualization; Advanced and Emerging Applications; Information Systems and Technologies; Urban and Regional Planning. Part II: Information Systems and Technologies; Part III: Information Systems and Technologies; Urban and Regional Planning; PHD Showcase Paper; Short papers.

9 特價4175
立即代訂
下次再買

Social First Brands

Tom,Miner  著
Kogan Page 出版
2025/06/27 出版

How can you build a social media strategy that outlasts trends and delivers real impact? Social First Brands is a practical guide for mid-career marketing professionals who want to develop strategies that create authentic connections, strengthen brand credibility and drive measurable results. Written by social media expert Tom Miner, it shares proven frameworks, examples and actionable tools from brands like Crocs, Stanley, Funko, and Ryanair. By showing how leading companies put social media at the heart of their marketing, this book equips you to move beyond quick wins and hacks to build strategies grounded in human behavior and long-term value. You will learn how to: - Develop a bespoke social media strategy aligned with brand principles- Build communities that foster loyalty and advocacy- Define and apply a distinctive, consistent brand personality online- Optimize content to resonate across audiences and platforms With detailed chapters, real-world examples and clear implementation steps, Social First Brands helps you apply proven principles to elevate your brand presence, strengthen customer relationships and advance your career impact. Themes include: strategy, principles, social media optimization, brand personality, audience engagement, community building

9 特價6633
立即代訂
下次再買

Innovative Computing 2025, Volume 3

Hao-Shang,Ma  著
Springer 出版
2025/06/27 出版
9 特價9395
立即代訂
下次再買

Computers and Their Applications

Ajay,Bandi  著
Springer 出版
2025/06/27 出版

This book constitutes the proceedings of the 40th International Conference on Computers and Their Applications, CATA 2025, which took place in San Francisco, CA, USA, during March 17-18, 2025. The 19 papers included in this book were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: Algorithms and AI;M machine learning and data mining; and security and networking.

9 特價4436
立即代訂
下次再買

Social First Brands

Tom,Miner  著
Kogan Page 出版
2025/06/27 出版

How can you build a social media strategy that outlasts trends and delivers real impact? Social First Brands is a practical guide for mid-career marketing professionals who want to develop strategies that create authentic connections, strengthen brand credibility and drive measurable results. Written by social media expert Tom Miner, it shares proven frameworks, examples and actionable tools from brands like Crocs, Stanley, Funko, and Ryanair. By showing how leading companies put social media at the heart of their marketing, this book equips you to move beyond quick wins and hacks to build strategies grounded in human behavior and long-term value. You will learn how to: - Develop a bespoke social media strategy aligned with brand principles- Build communities that foster loyalty and advocacy- Define and apply a distinctive, consistent brand personality online- Optimize content to resonate across audiences and platforms With detailed chapters, real-world examples and clear implementation steps, Social First Brands helps you apply proven principles to elevate your brand presence, strengthen customer relationships and advance your career impact. Themes include: strategy, principles, social media optimization, brand personality, audience engagement, community building

9 特價1929
立即代訂
下次再買

Prompting Made Simple

Rajeev,Kapur  著
Ingram 出版
2025/06/27 出版

UNLOCK THE POWER OF WORDS IN THE AGE OF AIYou don't need to code, you just need to know how to ask the right questions.Prompting Made Simple is your essential guide to mastering the most valuable new skill of the 21st century: communicating with AI.Whether you're a CEO, entrepreneur, teacher, or just curious about AI, this book gives you the keys to unlock superhuman productivity, creativity, and decision-making, using the right words at the right time.Inside, you'll discover: Proven prompt frameworks to get exactly what you want from ChatGPT and other AIsReal-world examples for business, education, writing, coding, and moreTime-saving shortcuts and expert techniques for beginners and pros alikePitfalls to avoid, and how to future-proof your skills in the AI eraThink of ChatGPT like a genie. Your wish is its command, if you know how to ask.Written by bestselling author of AI Made Simple, and AI advisor Rajeev Kapur, Prompting Made Simple doesn't just teach you how to talk to AI, it teaches you how to think in the age of AI.Prompting Made Simple makes AI easy, useful, and fun. You'll learn how to: Write better emails, plan smarter vacations, and organize your lifeGet AI to brainstorm, tutor, troubleshoot, and write with youUse real-world prompts that work right out of the boxIt's like having a tech-savvy best friend on call 24/7 that is fast, practical, and sometimes laugh-out-loud surprising.If AI Made Simple opened the door, Prompting Made Simple hands you the keys.

9 特價579
立即代訂
下次再買

Introduction to Modern Cryptography

Ingram 出版
2025/06/26 出版

Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment of this fascinating subject. This is an updated edition of the most widely used introduction to cryptography textbook.

9 特價8352
立即代訂
下次再買

6gn for Future Wireless Networks

Xiuhua,Li  著
Springer 出版
2025/06/26 出版

This volume set constitutes the proceedings of the 7th EAI International Conference on 6GN for Future Wireless Networks, 6GN 2024, held in Chongqing, China, in October 19-20, 2024. The 18 papers included in these proceedings were carefully reviewed and selected from50 submissions.They focus on the following topical sections such as Wireless Control and Network Optimization; Edge Computing and Resource Allocation; Intelligent Systems and Simulation; Artificial Intelligence and Digital Economy.

9 特價10439
立即代訂
下次再買

High-Speed Large Capacity Optical Fiber Communications

Feng,Tian  著
Springer 出版
2025/06/25 出版

This book systematically explores the synergistic integration of multidimensional modulation and coding technology, extend wavelength division multiplexing, space division multiplexing (SDM) and signal processing techniques to unlock unprecedented transmission capacities. From foundational principles to experimental validations, this book bridges theoretical concepts with practical implementations, offering a holistic view of scalable solutions for next-generation optical networks. Delving into both established and emerging paradigms, this book develops the key technology of improving the capacity of the transmission. It covers hybrid concatenated coding schemes, multi-carrier generation or multi-band transmission in achieving terabit-scale throughputs. This book also examines the role of self-homodyne coherent systems, SDM transmission system and the channel damage compensation algorithms, illustrates the real-world applicability of these technologies. The concluding chapter synthesizes key advancements and anticipates future challenges, positioning this book as an indispensable resource for researchers, engineers and graduate students seeking to advance the frontiers of high-speed, high-capacity optical communications.

9 特價10439
立即代訂
下次再買

The CISO 3.0

Walt,Powell  著
CRC Press 出版
2025/06/25 出版

This isn't just a book. It is a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, Chief Information Security Officers (CISOs) can no longer rely solely on technical expertise. They must evolve into strategic business leaders who can seamlessly integrate cybersecurity into the fabric of their organizations.This book challenges the traditional perception of CISOs as technical leaders, advocating for a strategic shift toward business alignment, quantitative risk management, and the embrace of emerging technologies like artificial intelligence (AI) and machine learning. It empowers CISOs to transcend their technical expertise and evolve into business-savvy leaders who are fully equipped to meet the rising expectations from boards, executives, and regulators. This book directly addresses the increasing demands from boards and regulators in the wake of recent high-profile cyber events, providing CISOs with the necessary skills and knowledge to navigate this new landscape.This book isn't just about theory but also action. It delves into the practicalities of business-aligned cybersecurity through real-life stories and illustrative examples that showcase the triumphs and tribulations of CISOs in the field. This book offers unparalleled insights gleaned from the author's extensive experience in advising hundreds of successful programs, including in-depth discussions on risk quantification, cyber insurance strategies, and defining materiality for risks and incidents. This book fills the gap left by other resources, providing clear guidance on translating business alignment concepts into practice.If you're a cybersecurity professional aspiring to a CISO role or an existing CISO seeking to enhance your strategic leadership skills and business acumen, this book is your roadmap. It is designed to bridge the gap between the technical and business worlds and empower you to become a strategic leader who drives value and protects your organization's most critical assets.

9 特價8874
立即代訂
下次再買

Data and Applications Security and Privacy XXXIX

Springer 出版
2025/06/25 出版

This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gj繪vik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.

9 特價3914
立即代訂
下次再買

How to Use ChatGPT for Authors

Ingram 出版
2025/06/25 出版
9 特價871
立即代訂
下次再買

Stripes Online Organizer

Gooseberry 出版
2025/06/24 出版
9 特價306
貨到通知
下次再買

The Design of Web Apis, Second Edition

Ingram 出版
2025/06/24 出版
9 特價2753
立即代訂
下次再買

Securing the Digital Frontier

Ingram 出版
2025/06/24 出版

Cyber space is easily the most complex thing humans have ever created. With billions of people and devices all connected together, vulnerability and compromise are inevitable. The complexity continues to grow, and with it comes the emergent insecurity brought by an ever-developing frontier where digital devices and connected people meet. Security challenges present themselves increasingly often and with ever-greater impacts. This is not going to change anytime soon. Although the internet has transformed communication, business, and social life for the better, the construct of 'cyber space' is incredibly fragile and presents endless risk. Connecting every corner of our lives to those of billions across the world, the frontier is slender between the good and the bad, benefit and catastrophe, real and fake, security and insecurity. Cyber security advice can be confusing, contradictory, and sometimes utterly detached from reality. Too easily, people feel guilty for not knowing what to do, or failing to live up to expectations. People, particularly business leaders and policy makers, must daily make security-sensitive decisions, sometimes unknowingly, without being security experts. Securing the Digital Frontier doesn't offer easy answers, but instead explains sixteen dimensions of this dynamic problem and its current partial solutions. The strong technology of encryption has become commonplace, and is a huge benefit if deployed well: but how can you tell? Programming errors give rise to security problems, but why can we not eliminate them? Privacy is tied up with security, but can the two work against each other? Cyber space is international: how can domestic laws protect us? And what happens when those laws come into conflict with technologies like encryption? Why do you need a punctuation symbol and a capital letter in your password, anyway? Through a grasp of the big picture, through technical and human perspectives, we can begin to explore ways to unwind some of the complexity and find ways to contain the risk.

9 特價1921
立即代訂
下次再買

The Ciso 3.0

Walt,Powell  著
Ingram 出版
2025/06/24 出版

This isn't just a book. It is a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, Chief Information Security Officers (CISOs) can no longer rely solely on technical expertise. They must evolve into strategic business leaders who can seamlessly integrate cybersecurity into the fabric of their organizations.This book challenges the traditional perception of CISOs as technical leaders, advocating for a strategic shift toward business alignment, quantitative risk management, and the embrace of emerging technologies like artificial intelligence (AI) and machine learning. It empowers CISOs to transcend their technical expertise and evolve into business-savvy leaders who are fully equipped to meet the rising expectations from boards, executives, and regulators. This book directly addresses the increasing demands from boards and regulators in the wake of recent high-profile cyber events, providing CISOs with the necessary skills and knowledge to navigate this new landscape.This book isn't just about theory but also action. It delves into the practicalities of business-aligned cybersecurity through real-life stories and illustrative examples that showcase the triumphs and tribulations of CISOs in the field. This book offers unparalleled insights gleaned from the author's extensive experience in advising hundreds of successful programs, including in-depth discussions on risk quantification, cyber insurance strategies, and defining materiality for risks and incidents. This book fills the gap left by other resources, providing clear guidance on translating business alignment concepts into practice.If you're a cybersecurity professional aspiring to a CISO role or an existing CISO seeking to enhance your strategic leadership skills and business acumen, this book is your roadmap. It is designed to bridge the gap between the technical and business worlds and empower you to become a strategic leader who drives value and protects your organization's most critical assets.

9 特價3600
立即代訂
下次再買

Applied Cryptography and Network Security

Springer 出版
2025/06/23 出版

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

9 特價7307
立即代訂
下次再買

Practical Deep Learning, 2nd Edition

Ingram 出版
2025/06/22 出版

Deep learning made simple. Dip into deep learning without drowning in theory with this fully updated edition of Practical Deep Learning from experienced author and AI expert Ronald T. Kneusel. After a brief review of basic math and coding principles, you'll dive into hands-on experiments and learn to build working models for everything from image analysis to creative writing, and gain a thorough understanding of how each technique works under the hood. Whether you're a developer looking to add AI to your toolkit or a student seeking practical machine learning skills, this book will teach you: How neural networks work and how they're trainedHow to use classical machine learning modelsHow to develop a deep learning model from scratchHow to evaluate models with industry-standard metricsHow to create your own generative AI modelsEach chapter emphasizes practical skill development and experimentation, building to a case study that incorporates everything you've learned to classify audio recordings. Examples of working code you can easily run and modify are provided, and all code is freely available on GitHub. With Practical Deep Learning, second edition, you'll gain the skills and confidence you need to build real AI systems that solve real problems. New to this edition: Material on computer vision, fine-tuning and transfer learning, localization, self-supervised learning, generative AI for novel image creation, and large language models for in-context learning, semantic search, and retrieval-augmented generation (RAG).

9 特價2394
立即代訂
下次再買

Cyber Secrets

Ingram 出版
2025/06/21 出版

The Brain Rot! Education Guide is a flexible resource for teaching AI literacy, persuasive technology, and digital wellbeingDesigned to accompany the Brain Rot! novel, this education guide equips educators, librarians, and caregivers with everything they need to lead timely, tech-aware learning. Aligned with ISTE Student Standards, it transforms complex issues-like algorithmic bias, emotional manipulation, and digital distraction-into accessible, age-appropriate lessons.The guide includes: Ready-to-use lesson plans tied to each chapter of the novelDiscussion prompts for classroom, book club, or home learning settingsTech-free and tech-supported activities to accommodate any learning environmentPrintable rubrics, worksheets, and visual resources for direct use with studentsCreative extensions including journaling, app audits, ethical design challenges, and roleplay scenariosWhether you're running a digital literacy unit in class, leading a library book group, or guiding your homeschoolers through digital dilemmas, the Brain Rot! Education Guide makes it easy to spark critical thinking, ethical reflection, and meaningful conversations about technology and AI.Let your learners cut through the noise-this guide helps them find the signal.

9 特價960
立即代訂
下次再買

Applied Cryptography and Network Security

Springer 出版
2025/06/21 出版

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

9 特價7307
立即代訂
下次再買

Foundations and Practice of Security

Kamel,Adi  著
Springer 出版
2025/06/21 出版

This two-volume set constitutes the refereed proceedings of the 17th International Symposium on Foundations and Practice of Security, FPS 2024, held in Montr矇al, QC, Canada, during December 09-11, 2024. The 28 full and 11 short papers presented in this book were carefully reviewed and selected from 75 submissions. The papers were organized in the following topical sections: Part I: Critical issues of protecting systems against digital threats, considering financial, technological, and operational implications; Automating and enhancing security mechanisms in software systems and data management; Cybersecurity and AI when applied to emerging technologies; Cybersecurity and Ethics; Cybersecurity and privacy in connected and autonomous systems for IoT, smart environments, and criticalinfrastructure; New trends in advanced cryptographic protocols. Part II: Preserving privacy and maintaining trust for end users in a complex and numeric cyberspace; Intersecting security, privacy, and machine learning techniques to detect, mitigate, and prevent threats; New trends of machine leaning and AI applied to cybersecurity.

9 特價7307
立即代訂
下次再買

Applied Cryptography and Network Security

Springer 出版
2025/06/21 出版

This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.The 55 full papers included in these proceedings were carefully reviewed and selected from 241 submissions. The papers cover all technical aspects of applied cryptography, network and computer security and privacy, representing both academic research work as well as developments in industrial and technical frontiers.

9 特價7307
立即代訂
下次再買

Innovative Computing 2025, Volume 2

Hao-Shang,Ma  著
Springer 出版
2025/06/20 出版
9 特價9395
立即代訂
下次再買

Learning Web Design

O'Reilly Me 出版
2025/06/20 出版

Do you want to build web pages but have no prior experience? This friendly guide is the perfect place to start. You'll begin at square one, learning how the web and web pages work, and then steadily build from there. By the end of the book, you'll have the skills to create a simple site with multicolumn pages that adapt for mobile devices. Each chapter provides exercises to help you learn various techniques and short quizzes to make sure you understand key concepts. This thoroughly revised sixth edition is ideal for students and professionals of all backgrounds and skill levels. It's simple and clear enough for beginners yet thorough enough to be a useful reference for experienced developers keeping their skills up-to-date. Build HTML pages with text, links, images, tables, and forms Use style sheets (CSS) for formatting text, colors, backgrounds, page layout, and simple animation effects Use CSS Flexbox and Grid Layout for sophisticated and flexible page designs Learn the ins and outs of responsive web design to make web pages look great on all devices Get an introductory lesson in JavaScript programming, and use it to add functionality to web pages Understand the ways in which JavaScript has become central to the web development workflow Create and optimize web images so they'll download as quickly as possible Get to know the superpowers of the SVG format The sixth edition features a completely rewritten and expanded JavaScript section written by Aaron Gustafson that provides more opportunities to practice writing code.

9 特價2736
加入購物車
下次再買

Podcast Studies

2025/06/18 出版

Podcast Studies: Practice into Theory critically examines the emergent field of podcasting in academia, revealing its significant impact on scholarly communication and approaches to research and knowledge creation. This collection presents in-depth analyses from scholars who have integrated podcasting into their academic pursuits. The book systematically explores the medium's implications for teaching, its effectiveness in reaching broader audiences, and its role in reshaping the dissemination of academic work. Covering a spectrum of disciplines, the contributors detail their engagement with podcasting, providing insight into its use as both a research tool and an object of analysis, thereby illuminating the multifaceted ways in which podcasting intersects with and influences academic life. The volume provides substantive evidence of podcasting's transformative effect on academia, offering reflections on its potential to facilitate a more accessible and engaging form of scholarly output. By presenting case studies and empirical research, Podcast Studies: Practice into Theory underscores the originality of podcasting as an academic endeavor and its utility in expanding the reach and impact of scholarly work. It serves as a key resource for academics, researchers, and practitioners interested in the application and study of podcasting as a novel vector for knowledge creation and distribution.

9 特價1822
立即代訂
下次再買

The Ultimate ChatGPT Prompt Book

Igor,Pogany  著
Ingram 出版
2025/06/18 出版

Discover the easiest way to leverage artificial intelligence with these 750+ ready-to-use ChatGPT prompts for common uses such as increasing work productivity, creative writing, fun and entertainment, and more. In this indispensable guide, Igor Pogany, Head of Education and partner of AI Advantage, empowers both newcomers and seasoned experts alike to "speak ChatGPT" with fluency and confidence. Now, interacting with ChatGPT is easier than ever with more than 750 expert-tested prompts for a myriad of practical use-cases. 100+ "cheat sheets" list specific prompts for achieving a given task, along with a prompting formula to help you tailor the prompt to your specific needs. Get equipped with ready-to-use solutions for your everyday challenges such as: -Improving productivity when learning new skills -Preparing schedules, balancing responsibilities, and creating budgets -Crafting compelling narratives and brainstorming creative ideas -Simplifying complex research topics -Considering career viability, preparing for interviews, and crafting persuasive cover letters -Prioritizing health with custom workout and meal plans -Busting boredom with games, jokes, and new movies and music discovery Unlock the immense potential of AI with The Ultimate ChatGPT Prompt Book and join the ranks of enthusiasts who have already revolutionized their lives with ChatGPT's versatility and ease of use.

9 特價547
立即代訂
下次再買

Introduction to Cryptographic Definitions

Fuchun,Guo  著
Springer 出版
2025/06/18 出版

Cryptographic definitions are often abstract and complex, making them challenging for beginners to understand and apply. This concise textbook/resource provides a structured introduction to cryptographic definitions, explaining the syntax definitions and security definitions of cryptographic primitives. It builds foundational knowledge by covering essential mathematical concepts and formal definitions in cryptology. Through a carefully designed learning curve, readers will grasp key elements, why they are defined this way, and how new definitions are developed. The book's presentation enables readers to validate and propose cryptographic definitions, offering a step-by-step guide to understanding them. Topics and features: - Covers all essential components of cryptographic definitions from sets and functions, making the subject accessible to beginners - Introduces intermediate concepts to smooth the transition from basic principles to formal definitions - Equips readers with the skills to validate and propose cryptographic definitions, linking theory with research - Minimizes unnecessary complexity while retaining depth, thereby ensuring a smooth learning experience Advanced undergraduate students, security engineers, and professionals interested in the formal foundations of cryptographic definitions will find the work an invaluable guide. The text is also an ideal reference for graduate students and early-stage researchers in cryptology and computer security.

9 特價3131
立即代訂
下次再買

SEO That Gets You Seen

Ingram 出版
2025/06/17 出版

SEO That Gets You Seen is a field guide for business owners who are tired of being invisible online. Whether you run a local service, an eCommerce shop, or a consulting business, this step-by-step book will help you understand what matters, take action, and finally show up on Google-without wasting time or money.In this practical guide, you'll learn how to: Understand how Google really works-no tech degree requiredFind keywords your customers are actually searching forOptimize your website structure and pages for rankings and conversionsWrite content that brings in leads (not just traffic)Rank higher in local search and Google MapsBuild backlinks the right way-without spam or shady tricksTrack your progress and avoid common SEO pitfallsYou'll also get access to: Clear explanations in plain EnglishChecklists, examples, and step-by-step instructionsA full glossary of terms to demystify the jargonRecommended tools (both free and paid) for every stage of the processWhether you're doing it yourself or managing someone else who is, this book is built for non-technical business owners who need their websites to perform. It cuts through the confusion and gives you a simple system you can apply at your own pace-even if you're short on time.You don't need to become an SEO expert. You just need to understand enough to make it work-and that's exactly what this book will teach you. If you're ready to stop guessing and start getting results, SEO That Gets You Seen is the guide you've been looking for.

9 特價844
立即代訂
下次再買

Healing with Artificial Intelligence

CRC Press 出版
2025/06/16 出版

Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applications in which artificial intelligence (AI) is involved. It is an almost sci-fi world that touches us closely and toward which we can harbor both great hopes and great fears. Health, in fact, is a central theme, and understanding how this new technology can help us to heal, acquire well-being, and live better is certainly important. This book, thanks to the author's great experience, deals comprehensively and accessibly with the benefits and risks of using AI in the field of health. It will enable the reader to confidently approach a revolution that will change the way we treat ourselves.

9 特價2713
立即代訂
下次再買

Healing with Artificial Intelligence

Ingram 出版
2025/06/16 出版

Diagnosis through images, robot surgeons, digital twins, and the metaverse are some of the applications in which artificial intelligence (AI) is involved. It is an almost sci-fi world that touches us closely and toward which we can harbor both great hopes and great fears. Health, in fact, is a central theme, and understanding how this new technology can help us to heal, acquire well-being, and live better is certainly important. This book, thanks to the author's great experience, deals comprehensively and accessibly with the benefits and risks of using AI in the field of health. It will enable the reader to confidently approach a revolution that will change the way we treat ourselves.

9 特價4801
立即代訂
下次再買

Principle of Architecture, Protocol, and Algorithms for Cog-Min

Hui,Li  著
Springer 出版
2025/06/16 出版

The Internet is the most important global infrastructure in the digital economy era. Its role has shifted from simple information exchange to support all kinds of novel scenarios and applications. Considering the diverse communication requirements, the development trend of the future network should support various addressing methods, such as IP address, identity, service, content, geographical location, and other potential communication modes. Therefore, a co-governed, secure, and evolvable novel network architecture is indispensable. This Open Access book focuses on Co-Governed Multi-Identifier Network (CoG-MIN), a promising future network architecture that provides an ecological solution for the sustainable evolution of packet networks. The design of CoG-MIN follows three main principles: blockchain-based global co-governed among top-level domains, endogenous network security, and sustainable evolution. CoG-MIN aims to promote peaceful, orderly, secure, and sustainable development for the global computer network. It will end the gridlock in which network systems need to be continuously upgraded due to the exponential scale expansion of addressing and routing on the current network layer. In other words, CoG-MIN enables a variety of networks to coexist and transition naturally. This will save countless establishment costs and take advantage of existing network equipment and devices. This book provides important reference materials about the mentioned topic for the research of computer network, network security, network communication, and other disciplines.

9 特價3131
立即代訂
下次再買
頁數10/89
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing